KEY
KEY name;
static size_t keylen(KEY s);
static NAMED *lookup(XML_Parser parser, HASH_TABLE *table, KEY name,
keyeq(KEY s1, KEY s2) {
keylen(KEY s) {
hash(XML_Parser parser, KEY s) {
lookup(XML_Parser parser, HASH_TABLE *table, KEY name, size_t createSize) {
state = KEY;
state = KEY;
state = KEY;
state = KEY;
state = KEY;
if (state != KEY)
if (state != KEY)
if (!EVP_AEAD_CTX_init(ctx, aead, bufs[KEY], lengths[KEY],
if (!EVP_EncryptInit_ex(ctx, NULL, NULL, bufs[KEY], NULL)) {
if (!EVP_DecryptInit_ex(ctx, NULL, NULL, bufs[KEY], NULL)) {
for ( SORTj=SORTi+SORTd; SORTj<=(up) && KEY((t)) > KEY((r)[SORTj]); SORTj+=SORTd ) \
case KEY:
{ "T", PRO_SPECIAL, 0, KEY, 0 },
KEY(vp->buffer, 0);
KEY(key, EC_MAPCOMMAND);
KEY(key, EC_MAPCOMMAND);
KEY(vp->buffer, 0);
KEY(key, EC_MAPCOMMAND);
KEY(vp->buffer, 0);
KEY(key, 0);
KEY(vp->character, 0);
KEY(vp->character, 0);
KEY(vp->character, 0);
%token DOMAIN ALTERNATIVE NAME NAMES CERT FULL CHAIN KEY SIGN WITH
| ACCOUNT KEY STRING keytype {
| DOMAIN KEY STRING keytype {
{"key", KEY},
| TCP MD5SIG KEY string {
%token TCP MD5SIG PASSWORD KEY TTLSECURITY
{ "key", KEY },
%token COMBINED CONNECTION DHE DIRECTORY ECDHE ERR FCGI INDEX IP KEY LIFETIME
{ "key", KEY },
| KEY STRING {
%token TCP MD5SIG PASSWORD KEY
| TCP MD5SIG KEY STRING {
{"key", KEY},
static KEY keylist[] = {
KEY *k, tmp;
k = (KEY *)bsearch(&tmp, keylist, sizeof(keylist) / sizeof(KEY),
sizeof(KEY), keycompare);
return (strcmp(((KEY *)a)->name, ((KEY *)b)->name));
| CA KEY STRING PASSWORD STRING {
%token MATCH PARAMS RANDOM LEASTSTATES SRCHASH KEY CERTIFICATE PASSWORD ECDHE
{ "key", KEY },
%token KEY
{ "key", KEY },
| KEY STRING {
SRS KEY STRING {
| SRS KEY BACKUP STRING {